CVE-2021-47047
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
28/02/2024
Last modified:
10/01/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails<br />
<br />
The spi controller supports 44-bit address space on AXI in DMA mode,<br />
so set dma_addr_t width to 44-bit to avoid using a swiotlb mapping.<br />
In addition, if dma_map_single fails, it should return immediately<br />
instead of continuing doing the DMA operation which bases on invalid<br />
address.<br />
<br />
This fixes the following crash which occurs in reading a big block<br />
from flash:<br />
<br />
[ 123.633577] zynqmp-qspi ff0f0000.spi: swiotlb buffer is full (sz: 4194304 bytes), total 32768 (slots), used 0 (slots)<br />
[ 123.644230] zynqmp-qspi ff0f0000.spi: ERR:rxdma:memory not mapped<br />
[ 123.784625] Unable to handle kernel paging request at virtual address 00000000003fffc0<br />
[ 123.792536] Mem abort info:<br />
[ 123.795313] ESR = 0x96000145<br />
[ 123.798351] EC = 0x25: DABT (current EL), IL = 32 bits<br />
[ 123.803655] SET = 0, FnV = 0<br />
[ 123.806693] EA = 0, S1PTW = 0<br />
[ 123.809818] Data abort info:<br />
[ 123.812683] ISV = 0, ISS = 0x00000145<br />
[ 123.816503] CM = 1, WnR = 1<br />
[ 123.819455] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000805047000<br />
[ 123.825887] [00000000003fffc0] pgd=0000000803b45003, p4d=0000000803b45003, pud=0000000000000000<br />
[ 123.834586] Internal error: Oops: 96000145 [#1] PREEMPT SMP
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10 (including) | 5.10.37 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.11.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.12 (including) | 5.12.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/126bdb606fd2802454e6048caef1be3e25dd121e
- https://git.kernel.org/stable/c/5980a3b9c933408bc22b0e349b78c3ebd7cbf880
- https://git.kernel.org/stable/c/bad5a23cf2b477fa78b85fd392736dae09a1e818
- https://git.kernel.org/stable/c/c26c026eb496261dbc0adbf606cc81989cd2038c
- https://git.kernel.org/stable/c/126bdb606fd2802454e6048caef1be3e25dd121e
- https://git.kernel.org/stable/c/5980a3b9c933408bc22b0e349b78c3ebd7cbf880
- https://git.kernel.org/stable/c/bad5a23cf2b477fa78b85fd392736dae09a1e818
- https://git.kernel.org/stable/c/c26c026eb496261dbc0adbf606cc81989cd2038c



